ORIGINAL RESEARCH article

Front. Comput. Sci., 04 June 2021

Sec. Mobile and Ubiquitous Computing

Volume 3 - 2021 | https://doi.org/10.3389/fcomp.2021.691854

Security Efficiency Maximization for Multi-UAV–Aided Network With Mobile Edge Computing

  • School of Electronic Information Engineering, Henan Institute of Technology, XinXiang, China

Article metrics

View details

1

Citations

1,8k

Views

610

Downloads

Abstract

In this study, we consider a security efficiency maximization problem in a multiple unmanned aerial vehicle (UAV)-aided system with mobile edge computing (MEC). Two kinds of UAVs, including multiple computing UAVs (CUAVs) and multiple jamming UAVs (JUAVs), are considered in this system. CUAVs would receive partial computation bits and send the computation results to ground users. JUAVs do not undertake computing tasks and only send interference signals to counter potential ground eavesdroppers. We jointly optimize the ground user scheduling, UAV power, and UAV trajectory to maximize the security efficiency. The original problem is non-convex and difficult to solve. We first use the Dinkelbach method combined with continuous convex approximation technology, and then propose three corresponding subproblems, including user scheduling subproblem, UAV power subproblem, and UAV trajectory problem. Further, we apply the branch and bound method to solve the user scheduling subproblem, and optimize the two remaining subproblems by introducing auxiliary variables and Taylor expansion. The simulation results show that the proposed scheme can obtain better secure off-loading efficiency with respect to the existing schemes.

1 Introduction

The application of 5G mobile communication technology has brought many conveniences to people’s life and production activities. The 5G network meets the needs of users for high bandwidth, low latency, and a large number of connected services. MEC is an important application in the 5G era. MEC provides local off-loading, which can effectively alleviate the data transmission pressure of the core network. In addition, mobile edge computing has flexible routing, efficient computing and storage capabilities, and can solve the key challenges of realizing the 5G vision (Pham et al., 2020). In many emerging applications, the demand for MEC is mainly reflected in the three aspects of delay, bandwidth, and security (Zhang et al., 2019). For instance, due to the limited battery capacity and energy consumption of mobile devices, MEC brings storage and computing resources to the edge of the network, enabling programs to run on mobile devices and meet latency requirements (Mach and Becvar, 2017). MEC-enabled loV can meet its heterogeneous needs for communication, computing, and storage, and to minimize the energy consumption of RSU (Ning et al., 2019). MEC cooperates with cloud computing to off-load the computing tasks in the vehicle network to the car, which can effectively reduce computing time and improve system practicability (Zhao et al., 2019). With the emergence of 5G, the industrial Internet is also developing rapidly. Data cleaning based on mobile edge nodes can maintain the reliability and integrity of data while improving the efficiency of data cleaning and reducing the energy consumption of industrial sensor cloud systems (Wang et al., 2020). In order to solve the problem of limited battery lifetime and low computing power of wireless devices, Mozaffari et al. (2019) proposed an MEC system supported by wireless power transfer to enhance computational capability. In the study by Han et al. (2020), the authors proposed a new algorithm to measure the efficiency of mobile edge computing systems. The maximum efficiency of MEC can be jointly optimized by the unloading time, CPU frequency, transmit power of users, and UAV trajectory (Bi and Zhang, 2018). Ding et al. (2019) studied the energy-saving resource allocation of MEC networks using NOMA.

MEC applications are deployed on general-purpose servers and are close to users, so UAVs are used to assist mobile edge computing. UAV-assisted MEC expands the coverage area of edge computing and improves computing capabilities. Due to the high mobility and flexibility of UAVs (Zeng and Zhang, 2017), UAV communication technology is widely used in many fields of electronic design, leading to rapid development of wireless communication technology (Gupta et al., 2016; Wu et al., 2018). Among them, Wu et al. (2018) considered a multi-UAV–enabled wireless communication system to provide services for ground users. UAVs can quickly cover the target area and divert services, which have a wide range of application scenarios (Sebastian and Jochen, 2014; Nader et al., 2018). For example, in smart cities, UAVs can be used for traffic management, environmental monitoring, pollution monitoring, and civil defense control (Hua et al., 2018). The use of drone aerial survey technology can effectively improve the efficiency and accuracy of topographic surveying and mapping work (Roberge et al., 2013). In the military field, UAVs can plan routes. Specifically, UAVs can plan a safe path in an obstacle environment according to their environment and maneuverability (Cao et al., 2018). When mobile edge computing is used to off-load computing tasks to UAVs, the off-loaded information may be destroyed by eavesdroppers. With the increasing demand for global cellular network coverage, UAVs combined with cellular networks can support UAV communications in a low-cost and highly maneuverable manner (Wu et al., 2018). As an aerial base station, UAVs help the ground macro base station to provide high-rate data coverage when there are multiple or large service demands in the target area (Sun et al., 2019). In the cellular-connected UAV mobile edge computing system, parts of the tasks are migrated to the terrestrial base station for calculation, and the other part is calculated on the UAV (Hua et al., 2018). When the cellular system is attacked by jamming, the UAV can select a relay strategy for the mobile users in the cellular system (Lu et al., 2020).

In order to improve traffic efficiency, the UAV-assisted MEC system with three-layer integrated architecture is used to solve the dynamic optimization problem of energy perception (Zhang et al., 2018). UAV-assisted MEC systems need to meet the requirements of low energy consumption and high computing bits (Loke, 2015; Zhou Z. et al., 2018). In the study by Zhou F. et al. (2018), the problem of maximizing computational efficiency is studied by jointly optimizing the computational shunt and the UAV trajectory design in the UAV-assisted MEC network. The problem of maximizing the unloading efficiency of the multi-UAV–assisted MEC system is studied.

The study considers the calculation of bits and energy consumption (Zhang et al., 2020). In order to expand the coverage of edge computing, multiple UAVs can be used to assist MEC systems (Narang et al., 2017). But UAV-assisted MEC systems are at risk of eavesdropping. Zhao et al. (2019) proposed an energy-saving computing off-loading technology focusing on physical layer security. UAVs are used to send jamming signals to combat against eavesdroppers and improve the transmission security rate (Li et al., 2019).

The rest of the article is organized as follows: Section 2 introduces the multiple UAV group–assisted MEC system and formulates the joint optimization problem. In Section 3, the optimal solution is proposed, while Section 4 details numerical simulations. Finally, Section 5 provides concluding remarks.

2 The System Model and Problem Formulation

2.1 The System Model

As shown in Figure 1, we consider a multiple UAV group–assisted MEC system, which includes jamming UAVs, UAVs, K eavesdroppers, and M legal smart mobile devices. A multiple UAV group has enormous computing ability, and its task is to fly from the initial position to the final position specified on the ground . Legitimate smart mobile devices can receive data from outside. Due to the limited computing performance of ground mobile devices, some data are off-loaded to UAV via wireless links for auxiliary calculations. But there will be eavesdroppers monitoring the eavesdropping data. For the security of data transmission, the jamming UAVs are added and the jamming data are sent to eavesdroppers, and the system operates within a certain flight period T. For ease of explanation, the flight period is divided into N slots with the same slot length. The slot length is small enough to allow the UAVs to fly at a small distance and approximate the channel gain within each slot.

FIGURE 1

Taking into account the 3-D Cartesian coordinate system, every legitimate device and the eavesdropper K scattered on the ground irregularly, and their horizontal coordinates are given by . Assume that all JUAVs are flying at a constant altitude above the ground, while UAVs are flying at a constant altitude above the ground.

The flight path of the slot projected by on the horizontal plane can be expressed as . The flight path of slot n projected by on the horizontal plane can be expressed as .

Therefore, we can obtain the distance between UAVs and any ground equipment at a time slot according to the Euclidean formula, as follows:

In general, for UAV-SMD wireless communication links, line-of-sight channels are more dominant than other channels. Similar to Hu et al. (2019) and Jeong et al. (2018), we consider that the wireless channel between ground equipment and UAV is a free space path loss model, which can be expressed as follows:where is the channel power gain at the reference distance .

The channel from the legal device to the listener can be modeled as follows:where φ is the path loss index, ξ is a random variable with exponential distribution, and its unit average represents small-scale Rayleigh fading.

For each legal device, its data can be calculated locally or its data can be off-loaded to the UAV for calculation. A binary variable is introduced to distinguish different states. The binary variable indicates that the UAV provides services for SMD in the time slot n and the two are associated, or it is 0.

2.1.1 Security Rate

Here, a UAV can serve up to one legitimate user:

Under the above conditions, the data transmission rate that the user can reach can be expressed aswherewhere represents the power of the additive Gaussian white noise.

Similarly, the achievable rate of the kth eavesdropper eavesdropping on user m in time slots is given bywhere

Therefore, in the case of k eavesdropper in the horizon time T, the worst-case security rate of the user is given by Zhu et al. (2017) and Zhu et al. (2016):

So the total expression isin which is the variable set of user association, system power, and trajectory of UAVs, that is, .

2.1.2 System Energy

The total energy consumption of the system consists of five parts: UAV transmission and unloading energy, UAV propulsion energy, ground equipment calculation energy, UAV calculation energy, and JUAV interference energy. According to Zeng and Zhang (2017), the propulsion energy of the UAV is much higher than other orders of magnitude, so only the propulsion energy of the UAV is calculated. The flight energy consumption of UAVs can be expressed aswhere g represents the acceleration of gravity, represents the wing area and air density constant of the UAV, and represents the weight-dependent constant of the UAV.

As a result, the total expression is expressed as

According to Sun et al. (2019), the computational efficiency is considered to be the ratio of the total calculation bit to the total energy consumption, as given below:

2.2 Problem Formulation

This study focuses on maximizing the off-loading efficiency of multi-UAV–assisted edge computing, which jointly optimizes user resource scheduling, UAV flight power, andUAV trajectory. Based on the above analysis, the problem in this study can be expressed as

3 Proposed Solution

In this section, the computational efficiency maximization problem is solved by the iterative optimization algorithm. Since problem P is a nonlinear fractional problem, in order to make the problem easier to deal with, the Dinkelbach method is used to eliminate the fractional structure. Considering the coupling of user association, resource allocation, and trajectory scheduling, we decompose the original problem into three subproblems and propose an iterative optimization algorithm to solve it.

3.1 Dinkelbach-Based Problem Reconstruction and Solution

With the application of the Dinkelbach method P, solving a fractional programming problem transforms the original problem into a parameter programming problem on the basis of the of the same constraint conditions. We introduce a parameter η to represent the computational efficiency according to Dinkelbach (1967).

Assuming that is the optimal computational efficiency, the following Lemma can define the necessary and sufficient conditions for the optimal solution.

Lemma 1: the optimal solution can be obtained if and only if

Proof: please refer to Dinkelbach (1967).

Problem p can be transformed into a parameter problem , according to Lemma 1, given as follows:where η is a nonnegative parameter. We then define the following equation:which is a strictly monotonic decreasing function for η (Li et al., 2019). If the optimal has been given in advance, we have for ; otherwise, we obtain for .

To obtain the optimal computational efficiency, a set of increments η is obtained by the Dinkelbach method, and the value of is approximately 0 by multiple iterations. The given η can be obtained by studying in problem . Based on the correct , we then get the value of the new η. After several iterations, the optimal and can be determined until is satisfied.

3.2 Joint Optimization

Although problem has been relatively easy to handle, it is still non-convex due to the coupling between the variables of the UAV trajectory, user resource scheduling, and UAV power and spectrum resources. For decoupling non-convex problems, we decompose the problem into different subproblems and propose an iterative algorithm to solve them alternately.

3.2.1 User Association Optimization

We first propose the following definition:in which

According to the previous results, we formulate the following alternative problem:

Equation 21 is a convex problem, which can be solved by the existing toolbox, such as CVX. We then focus on the resource allocation optimization.

3.2.2 Resource Allocation Optimization

In the case of given UAV user association and a flight trajectory, the power optimization of P1 in the problem can be changed into a new problem SP2 as follows.

It can be noticed that power p contains the UAV power pm and the jamming UAV power . The whole function is a non-convex function, and the two powers need to be discussed separately and transformed into convex functions.

It can be seen from the original formula of SP2 that . We then define a function as follows:where is a fraction, which can be transformed via the Dinkelbach method. Thus, we obtain the following version:

As a result, we transform the original problem p as follows:whose gradient can be expressed as follows:

We then carry out the first-order Taylor expansion of as follows:

Combining Eqs. 27, 28, we get the following problem:

Similarly, we transform the constraint as a convex form and obtain

Further, we carry out the first-order Taylor expansion of and transform it into the form of . Finally, can be optimized to the following form:

The convex transformation of UAV power is discussed as above, and the following is the same for interfering with UAV power .

We get the definition as , , , and . Then, the original problem is transformed intowhich can be expressed as

It can be seen that the original formula is not simple enough, so it should be further optimized. We assume , , , and . Then the function is transformed into

We similarly utilize the Dinkelbach method for the formula to optimize the fraction into an integral:whose gradient can be expressed as

According to the expression of , we transform into a new problem as follows:

3.2.3 Trajectory Scheduling of UAVs

Finally, we can optimize the trajectory scheduling of UAVs at a given user association and given power and frequency. The total SMD energy consumption for processing computing tasks is as follows:where the relaxation variable is used to replace the variable satisfyingwhich can be transformed into

It is worth noting that optimizing the original formula, we get the following formula:

In this way, the original problem becomes a convex expression as in Eq. 42, which can be solved by CVX.

4 Numerical Results

In this section, we provide a visual representation of our proposed scheme and comparison scheme. Since the space-to-ground channel is a LoS channel, we further assume that the ground signal obeys Rayleigh fading. We use MATLAB to generate artificial data, and in each setting, 1,000 experiments are used to take the average of the results. Specific parameter setting is provided in Table 1.

TABLE 1

ParameterSymbolValue
The total system bandwidthB30 MHz
The total task completion timeT100 s
Number of time slotsN50
The channel power gain at a reference distance of  m−30 dB
The noise power−60 dB
The fixed altitude of the UAV100 m
The maximum available speed of the UAV10 m/s
The initial and final position of the UAV(0,0), (200,0)
The position of the ground users(50,75), (150,75)
The position of the eavesdroppers(0,75), (200,75)
The effective switched capacitance of the UAVκ
Required CPU cycles per bit1,000 cycles/bit
Task input data size200 Kbits

Simulation parameters.

Figure 2 shows the UAVs’ flight trajectory and the location of the ground user. The red discrete points represent the flight trajectory of the interference UAV, and the black discrete points represent the flight trajectory of the UAV. The blue dots represent ground users, and the green dots represent eavesdroppers. It can be seen from the figure that the flying speed of the drone will slow down when it is close to the user, and the flying speed will increase when it is far away from the user.

FIGURE 2

Figure 3 represents how energy efficiency varies with the number of calculated bits. We have provided the results of four schemes for comparison: 1) the scheme proposed in this article, 2) the scheme without JUAV, 3) the case without eavesdroppers, and 4) the scheme with ground jammers. According to Figure 3, as the number of calculation bits increases, the energy efficiency gradually decreases. Furthermore, our proposed scheme has better performance than other benchmark schemes.

FIGURE 3

In Figure 4, it shows the variation of energy consumption with the number of bits. Since our proposed scheme is to maximize energy efficiency rather than minimizing energy consumption, we must consider whether the actual energy consumed is reasonable. The results in Figure 4 show that the proposed scheme still has better performance in terms of energy consumption.

FIGURE 4

In Figure 5, we show the energy efficiency curve with the maximum power on the drone. It is worth noting that as the maximum power of the UAV increases, the energy efficiency also increases. This is because when the energy is severely limited, the function of interfering with the eavesdropper and the auxiliary communication can seriously damage the safe rate. The greater the power of the UAVs, the less the impact of eavesdroppers.

FIGURE 5

5 Conclusion and Discussion

In this article, we propose a multi-UAVs–assisted mobile edge computing system in which different multi-UAVs undertake computing tasks and interference tasks, respectively. We propose an alternate optimization algorithm and transform different subproblems into convex problems for easy solution. The simulation results prove the superiority of our proposed scheme.

It is worth noting that we assume that both the air-to-ground channel and the terrestrial channel are perfectly known. However, in practical applications, the channel from the user to the potential eavesdropper is usually imperfect. In this case, how to enhance the robustness of the system is the direction of our follow-up work.

Statements

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.

Funding

This work was supported in part by the key scientific and technological project of Henan Province, Grant 212102210558.

Conflict of interest

The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Author Contribution

GM finished this paper independently, including the conception of the study, analysis and manuscript preparation, manuscript writing, and the experiment.

References

  • 1

    BiS.ZhangY. J. (2018). Computation Rate Maximization for Wireless Powered mobile-edge Computing with Binary Computation Offloading. IEEE Trans. Wireless Commun.17, 41774190. 10.1109/TWC.2018.2821664

  • 2

    CaoX.XuJ.ZhangR. (2018). “Mobile Edge Computing for Cellular-Connected Uav: Computation Offloading and Trajectory Optimization,” in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 15. 10.1109/SPAWC.2018.8445936

  • 3

    DingZ.FanP.PoorH. V. (2019). Impact of Non-orthogonal Multiple Access on the Offloading of mobile Edge Computing. IEEE Trans. Commun.67, 375390. 10.1109/TCOMM.2018.2870894

  • 4

    DinkelbachW. (1967). On Nonlinear Fractional Programming. Management Sci.13. 10.1287/mnsc.13.7.492

  • 5

    GuptaL.JainR.VaszkunG. (2016). Survey of Important Issues in Uav Communication Networks. IEEE Commun. Surv. Tutorials18, 11231152. 10.1109/COMST.2015.2495297

  • 6

    HanQ.ZhengG.XuC. (2020). “Energy-efficient Resource Allocation for mobile Edge Computing in Noma-Enabled Small Cell Networks,” in 2020 IEEE 20th International Conference on Communication Technology (ICCT), 415419. 10.1109/ICCT50939.2020.9295762

  • 7

    HuQ.CaiY.YuG.QinZ.ZhaoM.LiG. Y. (2019). Joint Offloading and Trajectory Design for Uav-Enabled mobile Edge Computing Systems. IEEE Internet Things J.6, 18791892. 10.1109/JIOT.2018.2878876

  • 8

    HuaM.HuangY.WangY.WuQ.DaiH.YangL. (2018). Energy Optimization for Cellular-Connected Multi-Uav mobile Edge Computing Systems with Multi-Access Schemes. J. Commun. Inf. Networks3 (4), 3344. 10.1109/iccs.2018.8689226

  • 9

    JeongS.SimeoneO.KangJ. (2018). Mobile Edge Computing via a Uav-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning. IEEE Trans. Veh. Technol.67, 20492063. 10.1109/TVT.2017.2706308

  • 10

    LiA.WuQ.ZhangR. (2019). Uav-enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel. IEEE Wireless Commun. Lett.8, 181184. 10.1109/LWC.2018.2865774

  • 11

    LokeS. W. (2015). The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and mobile Cloud in the Clouds. Computer Sci.

  • 12

    LuX.XiaoL.DaiC.DaiH. (2020). Uav-aided Cellular Communications with Deep Reinforcement Learning against Jamming. IEEE Wireless Commun.27, 4853. 10.1109/MWC.001.1900207

  • 13

    MachP.BecvarZ. (2017). Mobile Edge Computing: A Survey on Architecture and Computation Offloading. IEEE Commun. Surv. Tutorials19, 16281656. 10.1109/COMST.2017.2682318

  • 14

    MozaffariM.SaadW.BennisM.NamY.-H.DebbahM. (2019). A Tutorial on Uavs for Wireless Networks: Applications, Challenges, and Open Problems. IEEE Commun. Surv. Tutorials21, 23342360. 10.1109/COMST.2019.2902862

  • 15

    NaderM.JameelaA. J.ImadJ.AhmedI.FarhanM. (2018). Unmanned Aerial Vehicles Applications in Future Smart Cities. Technol. Forecast. Soc. Change153, S0040162517314968. 10.1016/j.techfore.2018.05.004

  • 16

    NarangM.XiangS.LiuW.GutierrezJ.ChiaraviglioL.SathiaseelanA.et al (2017). “Uav-assisted Edge Infrastructure for Challenged Networks,” in 2017 IEEE Conference on Computer Communications Workshops, Atlanta, GA, United States, (INFOCOM WKSHPS), 6065. 10.1109/INFCOMW.2017.8116353

  • 17

    NingZ.HuangJ.WangX.RodriguesJ. J. P. C.GuoL. (2019). Mobile Edge Computing-Enabled Internet of Vehicles: Toward Energy-Efficient Scheduling. IEEE Netw.33, 198205. 10.1109/MNET.2019.1800309

  • 18

    PhamQ.-V.FangF.HaV. N.PiranM. J.LeM.LeL. B.et al (2020). A Survey of Multi-Access Edge Computing in 5g and beyond: Fundamentals, Technology Integration, and State-Of-The-Art. IEEE Access8, 116974117017. 10.1109/ACCESS.2020.3001277

  • 19

    RobergeV.TarbouchiM.LabonteG. (2013). Comparison of Parallel Genetic Algorithm and Particle Swarm Optimization for Real-Time Uav Path Planning. IEEE Trans. Ind. Inf.9, 132141. 10.1109/TII.2012.2198665

  • 20

    SebastianS.JochenT. (2014). Mobile 3d Mapping for Surveying Earthwork Projects Using an Unmanned Aerial Vehicle (Uav) System. SciencDirect Automation in Constructin. 41, 114. 10.1016/j.autcon.2014.01.004

  • 21

    SunH.ZhouF.HuR. Q. (2019). Joint Offloading and Computation Energy Efficiency Maximization in a mobile Edge Computing System. IEEE Trans. Veh. Technol.68, 1. 10.1109/TVT.2019.2893094

  • 22

    WangT.KeH.ZhengX.WangK.SangaiahA. K.LiuA. (2020). Big Data Cleaning Based on mobile Edge Computing in Industrial Sensor-Cloud. IEEE Trans. Ind. Inf.16, 13211329. 10.1109/TII.2019.2938861

  • 23

    WuQ.ZengY.ZhangR. (2018). Joint Trajectory and Communication Design for Multi-Uav Enabled Wireless Networks. IEEE Trans. Wireless Commun.17, 21092121. 10.1109/TWC.2017.2789293

  • 24

    ZengY.ZhangR. (2017). Energy-efficient Uav Communication with Trajectory Optimization. IEEE Trans. Wireless Commun.16, 37473760. 10.1109/TWC.2017.2688328

  • 25

    ZhangJ.ZhouL.ZhouF.SeetB.-C.ZhangH.CaiZ.et al (2020). Computation-efficient Offloading and Trajectory Scheduling for Multi-Uav Assisted mobile Edge Computing. IEEE Trans. Veh. Technol.69, 21142125. 10.1109/TVT.2019.2960103

  • 26

    ZhangL.ZhaoZ.WuQ.ZhaoH.XuH.WuX. (2018). Energy-aware Dynamic Resource Allocation in Uav Assisted mobile Edge Computing over Social Internet of Vehicles. IEEE Access6, 5670056715. 10.1109/ACCESS.2018.2872753

  • 27

    ZhangX.ZhongY.LiuP.ZhouF.WangY. (2019). Resource Allocation for a Uav-Enabled mobile-edge Computing System: Computation Efficiency Maximization. IEEE Access7, 113345113354. 10.1109/ACCESS.2019.2935217

  • 28

    ZhouF.WuY.HuR. Q.QianY. (2018). Computation Rate Maximization in Uav-Enabled Wireless-Powered mobile-edge Computing Systems. IEEE J. Select. Areas Commun.36, 19271941. 10.1109/JSAC.2018.2864426

  • 29

    ZhouZ.FengJ.TanL.HeY.GongJ. (2018). An Air-Ground Integration Approach for mobile Edge Computing in Iot. IEEE Commun. Mag.56, 4047. 10.1109/MCOM.2018.1701111

  • 30

    ZhaoJ.LiQ.GongY.ZhangK. (2019). Computation Offloading and Resource Allocation for Cloud Assisted mobile Edge Computing in Vehicular Networks. IEEE Trans. Veh. Technol.68, 79447956. 10.1109/TVT.2019.2917890

  • 31

    ZhuZ.ChuZ.WangN.HuangS.WangZ.LeeI. (2017). Beamforming and Power Splitting Designs for An-Aided Secure Multi-User Mimo Swipt Systems. IEEE Trans.Inform.Forensic Secur.12, 28612874. 10.1109/TIFS.2017.2721908

  • 32

    ZhuZ.ChuZ.WangZ.LeeI. (2016). Outage Constrained Robust Beamforming for Secure Broadcasting Systems with Energy Harvesting. IEEE Trans. Wireless Commun.15, 76107620. 10.1109/TWC.2016.2605102

Summary

Keywords

mobile edge computing, multi-UAV, computation efficiency, secure transmission, jamming, trajectory scheduling

Citation

Mu G (2021) Security Efficiency Maximization for Multi-UAV–Aided Network With Mobile Edge Computing. Front. Comput. Sci. 3:691854. doi: 10.3389/fcomp.2021.691854

Received

07 April 2021

Accepted

11 May 2021

Published

04 June 2021

Volume

3 - 2021

Edited by

Wei Wu, Nanjing University of Posts and Telecommunications, China

Reviewed by

Yi Song, Huaiyin Normal University, China

Pei Li, Nanjing University of Posts and Telecommunications, China

Hongjiang Lei, Chongqing University of Posts and Telecommunications, China

Updates

Copyright

*Correspondence: Guangchen Mu,

This article was submitted to Mobile and Ubiquitous Computing, a section of the journal Frontiers in Computer Science

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Figures

Cite article

Copy to clipboard


Export citation file


Share article

Article metrics